General
-
Target
e1e8fe95693c9cffa68360a02a3a91402949035466e1b42b126e49390d5a7519.sample
-
Size
7KB
-
Sample
210726-wd82tfl9la
-
MD5
7cd8e2fc5fe2dc351f24417cc1d23afa
-
SHA1
1490ee2d05b8862d17bb87bc00f0f0cc21c5505f
-
SHA256
e1e8fe95693c9cffa68360a02a3a91402949035466e1b42b126e49390d5a7519
-
SHA512
a2ad0e06d71fa0e22d1e6aa03756de7b5b115a5f7c8dde36585d30c54ea3734bc135196b98686b359a181902db2f7a561b14617b8d965c8c62f50c07571ac5c3
Static task
static1
Behavioral task
behavioral1
Sample
e1e8fe95693c9cffa68360a02a3a91402949035466e1b42b126e49390d5a7519.sample.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
e1e8fe95693c9cffa68360a02a3a91402949035466e1b42b126e49390d5a7519.sample.exe
Resource
win10v20210408
Malware Config
Extracted
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\!_READ_ME_!.txt
content715@yahoo.com
1472DB432F3E8DCF907819E4105421598AF11417
Extracted
C:\odt\!_READ_ME_!.txt
decrypt482@yahoo.com
3549438760EB5FACD4AB1D4F06A1B5BFD8A8EAA6
35E5776048FDE181600A4DDA97BEC26501841D2C
Targets
-
-
Target
e1e8fe95693c9cffa68360a02a3a91402949035466e1b42b126e49390d5a7519.sample
-
Size
7KB
-
MD5
7cd8e2fc5fe2dc351f24417cc1d23afa
-
SHA1
1490ee2d05b8862d17bb87bc00f0f0cc21c5505f
-
SHA256
e1e8fe95693c9cffa68360a02a3a91402949035466e1b42b126e49390d5a7519
-
SHA512
a2ad0e06d71fa0e22d1e6aa03756de7b5b115a5f7c8dde36585d30c54ea3734bc135196b98686b359a181902db2f7a561b14617b8d965c8c62f50c07571ac5c3
Score10/10-
Deletes itself
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-